Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild

Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild

Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four high-severit…

CVE-2025-10585 Chrome vulnerability, zero-day exploit CVE-2025-6558 Chrome Zero-Day, V8 Vulnerability Chrome Zero-Day, Security Update

Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four high-severity security flaws. While all of these issues present serious risks, one stands out: CVE-2025-10585, a vulnerability in Chrome’s V8 JavaScript engine, is already being exploited in the wild.

CVE-2025-10585: Type Confusion in V8 (Zero-Day)

The most urgent of the fixes addresses a type confusion bug in V8, Chrome’s core JavaScript and WebAssembly engine. Reported by Google Threat Analysis Group (TAG), this vulnerability allows attackers to manipulate memory in ways that can lead to arbitrary code execution simply by luring users to malicious web pages. Google confirmed, “Google is aware that an exploit for CVE-2025-10585 exists in the wild,” underscoring the need for immediate patching.

CVE-2025-10500: Use-After-Free in Dawn

The second vulnerability, CVE-2025-10500, lies in Dawn, the graphics abstraction layer underpinning WebGPU. Reported by Giunash (Gyujeong Jin), this flaw is categorized as a use-after-free issue, which occurs when memory is improperly handled after being released. Such flaws can lead to browser crashes or, in the worst case, arbitrary code execution if exploited. Google awarded a $15,000 bounty for its discovery.

CVE-2025-10501: Use-After-Free in WebRTC

The third vulnerability, CVE-2025-10501, impacts WebRTC, the technology enabling real-time voice, video, and data sharing in browsers. Reported by sherkito, it also falls into the category of use-after-free flaws. Given WebRTC’s role in online communications, exploitation could allow attackers to compromise live sessions or crash communication services. Google issued a $10,000 reward for this report.

CVE-2025-10502: Heap Buffer Overflow in ANGLE

Finally, CVE-2025-10502 involves a heap buffer overflow in ANGLE, a graphics engine translation layer used to improve compatibility across graphics APIs like OpenGL and Direct3D. Reported by Google Big Sleep, the flaw could allow memory corruption and possible remote code execution. While details remain restricted, heap buffer overflows are often considered highly exploitable, especially in rendering contexts.

Previous Article

Critical Vulnerabilities Discovered in Planet Technology Industrial Cellular Gateways

Next Article

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *